Christopher Liebchen

Dr.-Ing. Christopher Liebchen

More information

E-Mail:

Vita

2014-2018 Research Assistant

2011 – 2014 M.Sc. IT Security

2008-2011 B.Sc. Computer Science

Research Interests

  • Memory-corruption Attacks and Defenses
  • Reverse Engineering

Academic Services

Supervised Students

  • Kjell Braden, Master Thesis (October 2015)
    Title: Leakage-Resilient Layout Randomization for Mobile Devices
    The results of this thesis have been published at NDSS 2016
  • David Gens, Master Thesis (Feburary 2016)
    Title: Page Table Randomization: Memory Protection Resilient to Data-Only Attacks
    The results of this thesis have been published at NDSS 2017
  • Markus Schader, Bachelor Thesis (Feburary 2016)
    Title: Advanced Code-Injection Attacks using Just-in-time Compilers
  • Tommaso Frassetto, Master Thesis (March 2016)
    Title: Self-Rando: Practical and Efficient Load-time Randomization
    The results of this thesis have been published at PETS 2016
  • David Rieger, Master Thesis (April 2017)
    Title: Mitigation of Memory-Corruption Attacks Based on Multi-Architecture Execution
  • Patrick Jauernig, Master Thesis (October 2017)
    Title: SMOV: Lighweight in-Process Memory Isolation
    The results of this thesis have been published at USENIX Security 2018

Publications

Gruppiere nach: Datum | Typ des Eintrags | Keine Gruppierung
Springe zu: 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012
Anzahl der Einträge: 22.

2018

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, 15.-17.08.2018, Baltimore, MD, USA. 27th USENIX Security Symposium
[Konferenz- oder Workshop-Beitrag] , (2018)

Liebchen, Christopher :
Advancing Memory-corruption Attacks and Defenses.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8090]
Technische Universität , Darmstadt
[Dissertation], (2018)

2017

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
JITGuard: Hardening Just-in-time Compilers with SGX.
24th ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean :
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017)
[Konferenz- oder Workshop-Beitrag] , (2017)

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17 .
[Konferenz- oder Workshop-Beitrag] , (2017)

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2017)

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed :
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
24th Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2017)

2016

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
[Online-Edition: https://arxiv.org/abs/1611.08396]
In: Cryptography and Security
[Artikel] , (2016)

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza :
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
The annual Privacy Enhancing Technologies Symposium (PETS)
[Konferenz- oder Workshop-Beitrag] , (2016)

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Regulating ARM TrustZone Devices in Restricted Spaces.
14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
[Konferenz- oder Workshop-Beitrag] , (2016)

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Leakage-Resilient Layout Randomization for Mobile Devices.
23rd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2016)

2015

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza :
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2015)

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael :
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
22nd ACM Conference on Computer and Communications Security (CCS)
[Konferenz- oder Workshop-Beitrag] , (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Return to Where? You Can't Exploit What You Can't Find.
Blackhat USA
[Konferenz- oder Workshop-Beitrag] , (2015)

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael :
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag] , (2015)

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten :
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag] , (2015)

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian :
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
22nd Annual Network & Distributed System Security Symposium (NDSS)
[Konferenz- oder Workshop-Beitrag] , (2015)

2014

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
[Artikel] , (2014)

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza :
On the (In)Security of Mobile Two-Factor Authentication.
Financial Cryptography and Data Security (FC'14) Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

2013

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
BlackHat USA
[Konferenz- oder Workshop-Beitrag] , (2013)

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza :
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
34th IEEE Symposium on Security and Privacy (Oakland 2013)
[Konferenz- oder Workshop-Beitrag] , (2013)

2012

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza :
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
BlackHat Abu Dhabi
[Konferenz- oder Workshop-Beitrag] , (2012)

Diese Liste wurde am Mon Dec 17 04:56:40 2018 CET generiert.

go to list